Oil/Gas Distribution

April 27, 2023
9

Written By Stephen Cardot

Situation:

CloudCover was brought in to address network security concerns for a large US based energy distribution and storage company with hundreds of employees in multiple locations across the United States following the Colonial Pipeline ransomware data breach event in 2021. Upon investigation, we discovered that Russian attackers had infiltrated the network through the VOIP phone system. Thanks to the expertise of the CC/B1 team, they were able to quickly detect and block the threats.

Solution:

We installed our AI-based CC/B1 security solution to monitor all internal SCADA network traffic in the researcher’s lab environment. We then we placed CC/B1 into full security protection mode after 72-hours of mapping the topology of the client’s network.

Results:

Using AI machine learning and deep packet inspection, we found an average of 2.3 million security events per day including Russian attackers who had infiltrated the network through the VOIP phone system. The CC/B1 was able to detect this unique threat vector and immediately stopped and blocked the attacks instantaneously.

On a monthly basis (to date), the energy distribution and storage company’s network experiences an average of 70 million security events. Despite this high volume of events, the CC/B1 team is capable of successfully detecting, mitigating and protect the network by stopping an average of 8,000 ‘never-before-seen’ malware-based attacks each month utilizing its generative-AI XDR/SASE system.

About Stephen Cardot

Veteran IT developer with 28 years’ experience in designing robust, scalable solutions. Patent author of real-time risk scoring and data insurance. Believes sub-second risk control and incremental risk transfer are the future of cyber safety and security.

Related Posts

Government

Government

When a Local or County government experiences a cyberattack, it’s not just the entity’s network security that’s at risk — it’s also the lives of the residents who depend on it to supply safe drinking water, access to oil and gas, and critical emergency services. Government organizations have become prime targets for cyberattacks due to their dependence on critical IT systems, lean budgets and minimal staff, and the treasure trove of valuable information stored in their networks.

read more
Banking

Banking

Financial services and banking institutions have long been prime targets for cyber attacks for a simple reason – where there’s money, there’s money to be made. According to a study conducted by the Federal Reserve Bank, companies in this sector are 300x times more at risk for data security threats than any other industry. Knowing this, the midwest bank knew they needed to implement a comprehensive network security strategy – and they needed to do it with a lack of staff and budget.

read more
Healthcare

Healthcare

Healthcare systems are particularly vulnerable to cyberattacks due to the sheer volume of information they possess – information that’s of high monetary and intelligence value. Pair that with the incredible complexity of healthcare organizations – legacy systems, resource availability, compliance, and more – and you’ve got yourself a challenging environment. Our client, an IT department within a multi-campus healthcare system, was uneasy with the lack of a holistic network security solution, so we installed the B100 series of our CyberSafety CC/B1 Platform.

read more